Vulnerability Name: | CVE-2001-0170 (CCN-5907) | ||||||||
Assigned: | 2001-01-10 | ||||||||
Published: | 2001-01-10 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: Vendor Advisory 20010110 Glibc Local Root Exploit Source: CCN Type: BugTraq Mailing List, Wed Jan 10 2001 - 01:06:48 CST Glibc Local Root Exploit Source: CCN Type: BugTraq Mailing List, Wed Jan 10 2001 - 12:31:22 CST Re: Glibc Local Root Exploit Source: BUGTRAQ Type: Patch, Vendor Advisory 20010110 [slackware-security] glibc 2.2 local vulnerability on setuid binaries Source: MITRE Type: CNA CVE-2001-0170 Source: CCN Type: RHSA-2001-001 glibc file read or write access local vulnerability Source: REDHAT Type: Patch, Vendor Advisory RHSA-2001:001 Source: BID Type: Patch, Vendor Advisory 2181 Source: CCN Type: BID-2181 glibc RESOLV_HOST_CONF File Read Access Vulnerability Source: CCN Type: Slackware Security Advisory glibc 2.2 local vulnerability on setuid binaries Source: XF Type: UNKNOWN linux-glibc-read-files(5907) Source: XF Type: UNKNOWN linux-glibc-read-files(5907) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||
BACK |